The policy knot: re-integrating policy, practice and design in cscw studies of social computing

In CSCW and information science research today, the worlds of design, practice, and policy are often held separate, speaking to different audiences, venues, and fields of expertise. But many growing areas of CSCW work, including mobile, cloud, and social computing, run into problems precisely at this intersection. This paper presents a model for understanding processes of change and emergence in social computing in which policy, practice, and design show up in the form of complex interdependencies, or knots, that collectively determine the shape, meaning, and trajectory of shifting computational forms. We then apply this model to two recent social computing controversies: the 2011 privacy scandal surrounding the location-aware mobile app Girls Around Me; and controversies surrounding the 2010 launch of the Google Buzz social network. We argue that better attention to the mutually constitutive relations between design, practice and policy can expand the reach, depth, and impact of CSCW scholarship.

[1]  Derek E. Bambauer,et al.  UNIVERSITY of PENNSYLVANIA LAW REVIEW , 2014 .

[2]  P. N. Edwards,et al.  Knowledge Infrastructures: Intellectual Frameworks and Research Challenges , 2013 .

[3]  Sarah Barbrow,et al.  Infrastructure and vocation: field, calling and computation in ecology , 2013, CHI.

[4]  Scott Counts,et al.  Proceedings of the 2013 conference on Computer supported cooperative work , 2013, CSCW 2013.

[5]  Drew Paine,et al.  The work of developing cyberinfrastructure middleware projects , 2013, CSCW.

[6]  Cliff Lampe,et al.  Users and nonusers: interactions between levels of adoption and social capital , 2013, CSCW '13.

[7]  Theresa Velden,et al.  Explaining field differences in openness and sharing in scientific communities , 2013, CSCW.

[8]  Steven J. Jackson,et al.  Why CSCW needs science policy (and vice versa) , 2013, CSCW.

[9]  Helena M. Mentis,et al.  Non-static nature of patient consent: shifting privacy perspectives in health information sharing , 2013, CSCW.

[10]  Yunan Chen,et al.  Privacy management in dynamic groups: understanding information privacy in medical practices , 2013, CSCW.

[11]  Jens Grossklags,et al.  An online experiment of privacy authorization dialogues for social applications , 2013, CSCW.

[12]  Judith Fathallah Reclaiming Fair Use: How to Put Balance Back in Copyright , 2012 .

[13]  Louise Barkhuus The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI , 2012, CHI.

[14]  Margaret L. Hedstrom,et al.  How research funding affects data sharing , 2012, CSCW.

[15]  Pamela J. Wisniewski,et al.  Reconciling privacy with social media , 2012, CSCW.

[16]  Frederic Stutzman,et al.  Boundary regulation in social media , 2012, CSCW.

[17]  Users and Nonusers : Interactions between Levels of Facebook Adoption and Social Capital , 2012 .

[18]  Paul Dourish,et al.  The value of data: considering the context of production in data economies , 2011, CSCW.

[19]  Katz v. United States , 2010 .

[20]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[21]  S. Wyatt Technological determinism is dead; Long live technological determinism. , 2008 .

[22]  Lucy Suchman,et al.  Human-Machine Reconfigurations: Plans and Situated Actions , 2006 .

[23]  Paul Dourish,et al.  Implications for design , 2006, CHI.

[24]  Daniel J. Solove A Taxonomy of Privacy , 2006 .

[25]  John Leslie King,et al.  Rob Kling and the Irvine School , 2004, Inf. Soc..

[26]  S. Jasanoff States of Knowledge: The Co-production of Science and the Social Order , 2004 .

[27]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[28]  Edward W. Felten,et al.  A skeptical view of DRM and fair use , 2003, CACM.

[29]  Rob Kling,et al.  Social Informatics: A New Perspective on Social Research about Information and Communication Technologies , 2000 .

[30]  Mark S. Ackerman,et al.  The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility , 2000, Hum. Comput. Interact..

[31]  Charles Bazerman,et al.  The Languages Of Edison's Light , 2001 .

[32]  Bonnie A. Nardi,et al.  Information Ecologies: Using Technology with Heart , 1999 .

[33]  Y. Engeström,et al.  Perspectives on activity theory: Introduction , 1999 .

[34]  Y. Engeström,et al.  Perspectives on activity theory: Play, learning, and instruction , 1999 .

[35]  R. Nelson Bicycles, bakelites and bulbs: Toward a theory of sociotechnical change , 1997 .

[36]  David G. Post Law in cyberspace (tutorial session) (abstract only) , 1996, CSCW '96.

[37]  R. Lamb,et al.  Of Bicycles, Bakelites, and Bulbs: Toward a Theory of Sociotechnical Change , 1996, Inf. Process. Manag..

[38]  Hugh Richard Slotten,et al.  Selling the Air: A Critique of the Policy of Commercial Broadcasting in the United States by Thomas Streeter (review) , 1996, Technology and Culture.

[39]  A. Roland,et al.  Does Technology Drive History? The Dilemma of Technological Determinism. , 1995 .

[40]  Karen Ruhleder,et al.  Steps towards an ecology of infrastructure: complex problems in design and access for large-scale collaborative systems , 1994, CSCW '94.

[41]  Frank Webster,et al.  What Information Society? , 1994, Inf. Soc..

[42]  Rob Kling,et al.  Controversies about privacy and open information in CSCW , 1992, CSCW '92.

[43]  R. Kling Computerization and Social Transformations , 1991 .

[44]  C. Marvin,et al.  Review: When Old Technologies Were New, by Carolyn Marvin, Oxford University Press , 1989 .

[45]  Jonathan Grudin,et al.  Why CSCW applications fail: problems in the design and evaluationof organizational interfaces , 1988, CSCW '88.

[46]  T. P. Hughes,et al.  The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology , 1989 .

[47]  T. Pinch,et al.  The Social Construction of Facts and Artefacts: or How the Sociology of Science and the Sociology of Technology might Benefit Each Other , 1984 .

[48]  Stephen D. Krasner Structural causes and regime consequences: regimes as intervening variables , 1982, International Organization.

[49]  Rob Kling,et al.  The Web of Computing: Computer Technology as Social Organization , 1982, Adv. Comput..

[50]  H. Butterfield,et al.  The Whig interpretation of history , 1931 .

[51]  mile .QDurkheim mile Durkheim,et al.  The Elementary Forms of Religious Life , 1916 .